Privacy Protection Legislative Scenario in Select Countries: An Exploratory Study.

Author(s)

Dr. Madan Lal Bhasin ,

Download Full PDF Pages: 14-32 | Views: 342 | Downloads: 103 | DOI: 10.5281/zenodo.3466150

Volume 5 - October 2016 (10)

Abstract

The right of privacy is well established in international law. In fact, consumer privacy has attracted the widespread attention of regulators across the globe. Of course, privacy laws vary throughout the globe but, unfortunately, it has turned out to be the subject of legal contention between the European Union (EU) and the United States (US). Protection of personal data privacy under the law has been shaped by the interests of multiple constituencies: individuals, commercial organizations, government agencies, law enforcement, and national security services. For corporations that collect and use personal information, now ignoring privacy legislative and regulatory warning signs can prove to be a costly mistake. One of the greatest challenges faced by privacy and data protection professionals is demonstrating that their organizations have complied with the requirements of the various laws governing the handling of personal data. The freshly revised BS10012 can help organizations to meet their privacy management obligations. This is an exploratory, descriptive and qualitative study using secondary sources of data. Here, an attempt has been made to briefly acquaint the readers’ with the privacy laws prevalent in select countries. It is expected that a growing number of countries will adopt privacy laws to foster e-commerce. Undoubtedly, accountability for privacy and personal data protection needs to be a joint-effort among governments, privacy commissioners, organizations and individuals themselves. Legislators all over the world have taken notice and tried to minimize invasion of privacy but without much success. 

Keywords

Privacy protection, e-business, trust seals, government regulations, select countries.

References

  1. Ashford, W. (2016), Slow response to Privacy Shield EU-US data transfer program, ComputerWeekly.Com. 15 August.
  2. Ahmad, T. (2009). Right of Privacy: Constitutional Issues and Judicial Responses in USA and India, particularly in Cyber age, available at www.ssrn.com/abstract=1440665.
  3. Bauer, C., Korunovska, J., & Spiekermann, S., (2012). On the value of information - what Facebook users are willing to pay? ECIS 2012 Proceedings. Paper 197. Available at: http://aisel.aisnet.org/ecis2012/197
  4. Basu, S. (2010), Policy-Making, Technology and Privacy in India, The Indian Journal of Law and Technology, 6(1), 65-88.
  5. Bayardo and Srikant (2003), Technological Solutions for Protecting Privacy, Web Technologies, Sept. 115-118.
  6. Bhasin, M.L. (2005). Challenges of Guarding Privacy—Practices Prevalent in Major Countries, The Chartered Accountant, January, 735-745.
  7. Bhasin, M.L. (2006). Guarding Privacy on the Internet, Global Business Review, 7(1), January-June, 137-156.
  8. Bhasin, M. L. (2006a). Data Mining: A Competitive Tool for Banking and Retail Industries, The Chartered Accountant, October, 588- 594.
  9. Bhasin, M.L. (2006b). Privacy Protection on the Internet: Privacy Policy, Government Regulation and Technology Solutions, Amity Business Review, July-December, 44-59.
  10. Bhasin, M. L. (2007). Mitigating Cyber Threats to Banking Industry, The Chartered Accountant, April, 50(10), 1618-1624.
  11. Bhasin, M.L. (2008). Guarding Privacy on the Internet: Privacy Policy, Government Regulations and Technology Solutions, International Journal of Internet Marketing and Advertising, 4(2/3), Special Issue on SME‘s, 213-240.
  12. Bhasin, M. L. (2012). Online Privacy Protection: Privacy Seals and Government Regulations in Select Countries, International Journal of Finance and Accounting, 1(6), Nov., 148-161.
  13. Bhasin, M. L. (2012a). Guarding Online Privacy: Privacy Seals and Government Regulations, European Journal of Business and Social Sciences, 1(9), Dec. 2012, 1-20.
  14. Bhasin, M.L. (2015). Menace of Frauds in Banking Industry: Experience of a Developing Country, Australian Journal of Business and Management Research, 4(12), April 21-33.
  15. Bhasin, M.L. (2016). Integration of Technology to Combat Bank Frauds: Experience of a Developing Country, Wulfenia Journal, Feb., 23(2), 201-233.
  16. Bhasin, M.L. (2016a). Online Privacy Protection: Privacy Seals, Government Regulations and Technological Solutions, International Journal of Management Sciences and Business Research, 5(7), July, 86-116.
  17. Bowman, L.M. (2010). House Pulls Carnivore into the Light. ZDNet News (23 July).
  18. Chaffey, D. and White, G. (2011). Business Information Management. Prentice-Hall, Financial Times, 2nd edition.
  19. Chew, K.Y. (2015), Data Protection Compliance in Malaysia Set to Cause Headaches to Businesses, Baker & McKenzie. Available at http://www.bakerinform.com.
  20. Chan, M. and Allison, D. (2015), Hong Kong: Law prohibiting the transfer of personal data soon to come into Force, 16 Jan. Available at http://www.twobirds.com.
  21. Cobb, S. (2016), Data privacy and data protection: US law and legislation, An ESET White Paper, 1-15. Available at http://www.welivesecurity.com.
  22. Council of Europe (2014), Handbook on European data protection law. Available at http://fra.europa.eu.
  23. Culnan, M. (2002). Georgetown Internet Privacy Policy Study. McDonough School of Business, Georgetown University, see http://www.msb.edu/faculty/culnan/gippshome.html.
  24. European Organization for Security (EOS)-Privacy & Data Protection Task Force (2010). EU policies on privacy and data protection and their impact on the implementation of security solutions. Sept., 1-17.
  25. European Commission (2011). Workshop on Privacy protection and ICT: Research ideas. Workshop Report, Sept.21, Brussels.
  26. European Commission & Union (1998), Directive on Data Protection (Directive 95), available at http://eur-lex.europa.eu.
  27. E&Y (2014) Privacy Trends 2014: Privacy Protection in the age of Technology. Available at www.ey.com. 1-24.
  28. Federal Trade Commission (2010). Protecting Consumer Privacy in an Era of Rapid Change: A proposed framework for business and policymakers. December. Available at www.ftc.org.
  29. Fuchs, C. (2011). The political economy of privacy on Facebook. The Internet & Surveillance, Research paper 9 series, Vienna, Australia. Available at www.uti.at.
  30. Geller, T. (2016). In Privacy Law, It is the U.S. vs. the World, Communications of the ACM, 59(2), 21-23.
  31. Goldfarb, A., & Tucker, C. E. (2011). Privacy regulation and online advertising. Management Science, 57(1), 57-71.
  32. Greenleaf, G. (2015b). Global Data Privacy Laws 2015: 109 Countries, with European Laws Now a Minority, 33 Privacy Laws & Business International Report, February, UNSW Law Research Paper No. 2015-21.
  33. Greenleaf, G. (2015). Hong Kong data privacy 2015: Cautious enforcement, strong principles, Privacy Laws & Business International Report, 21-23, December, 1-5.
  34. Greenleaf, G. (2015a). Confusion as Indian Supreme Court Compromises on Data Privacy and ID Number, 28 Sept. Privacy Laws & Business International Report, 24-26, Sept. UNSW Law Research Paper No. 2016-06. Available at http://papers.ssrn.com.
  35. Internet Policy Task Force Report (2010), Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework, Department of Commerce and Internet Policy Task Force Report. Available at http://www.ntia.doc.gov/
  36. Kolekar, Y.P. (2015), Protection of Data under Information Technology Law in India, 27 April, 1-12. Available at SSRN: http://ssrn.com/abstract=2599493.
  37. Krill, P. (2002). DoubleClick Discontinues Web Tracking Service. InfoWorld, 9 January. Available at: http://www.infoworld.com/articles.
  38. Kugler, L. (2015). Online Privacy: Regional Differences, Communications of the ACM, Feb., 58(2), 18-20.
  39. Laudon, K.C & Traver, C.G. (2014). E-commerce 10th edition, Addison Wesley, NY.
  40. Laudon, K.C. and Laudon, J.P. (2016) Management Information Systems: Managing the digital firm. Pearson, 14th edition.
  41. Majid, A. (2016), Malaysia: Personal Data Protection Standards - 12 Jan. Available at http://www.mondaq.com.
  42. Mantelero, A. (2012), Cloud computing, trans-border data flows and the European Directive 95/46/EC: applicable law and task distribution‘, European Journal for Law and Technology, 3(2).
  43. Morando, F., Iemma, R., & Raiteri, R. (2014). Privacy evaluation: what empirical research on users‘ valuation of personal data tells us, Internet Policy Review, 3(2), May, available at http://policyreview.info.
  44. Office of the Privacy Commissioner of Canada (2016). The Internet of Things: An introduction to privacy issues with a focus on the retail and home environments, available at https://www.priv.gc.ca.
  45. Organization for Economic Co-operation and Development (1980). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Available at http://www.oecd.org.
  46. Parsons, M. and Colegate, P. (2015), The Turning Point for Data Privacy Regulation in Asia? Chronicle of Data Protection, 18 Feb. Available at http://www.hldataprotection.com.
  47. Pfeifle, S. (2015), The Regulators‘ View of the Singapore Privacy Law, The Privacy Advisor, 12 May, available at https://iapp.org.
  48. Pierce, L. (2013), Protection of Personal Information Act: Are you compliant? Mail & Guardian, Dec. 2. Available at http://mg.co.za/article/2013-12-02-protection-of-personal-information-act-are-you-compliant.
  49. Robert, J. (2011), Five Solutions To The Privacy Problem: Why They Work And Why They Don't. Available at https://gigaom.com.
  50. Sotto, L.J. and Hydak, C.D. (2016), The EU-US Privacy Shield: A How-To Guide, Law360, July 19, 1-4.
  51. Srinivas, B.V. (2015), A Concise Guide to Various Australian Laws Related to Privacy and Cyber Security Domains, SANS Institute InfoSec Reading Room Site, 1-30. Available at https://www.sans.org.
  52. Srivas, A. (2016), Cross-Border Data Flows Debate Hits India as TRAI Issues Paper on Cloud Services, The Wire, 11 June, available at http://thewire.in.
  53. Shah, A. and Zacharias, N. (2010), Right to privacy and data protection, Nitin Desai Associates, Mumbai.
  54. Slyke, C.V., & Belanger, F. (2012). E-Business Technologies: Supporting the Net-Enhanced Organization. John Wiley & Sons.
  55. Stevens, Toby (2016), Data Protection: Objectives or Outcomes? 14 Sept. Available at ComputerWeekly.com.
  56. Stevens, G. (2011). Privacy protections for personal information online, April, Congressional Research Service Report 7-5700, available at www.crs.gov.
  57. Swire, P., Hemmings, J. & Kirkland, A. (2016). Online Privacy and ISPS, working paper of The Institute for Information Security & Privacy, Feb. 29. Available at http://www.iisp.gatech.edu.
  58. Thiel, S. and Biggs, C. (2016), Singapore‘s enforcement of data protection law on the rise, 23 Aug. DLA Piper, available at https://www.technologyslegaledge.com.
  59. Thiel, S. and Biggs, C. (2016a), Hong Kong‘s Privacy Commissioner addresses privacy compliance and best practice for BYOD, 21 Sept. available at http://blogs.dlapiper.com.
  60. UNESCO (2012). Preserving Privacy in the Information Society. Available at electronically at www.unesco.org.
  61. Weiss, M.A. & Archick, K. (2016), U.S.-EU Data Privacy: From Safe Harbor to Privacy Shield, Congressional Research Service, 7- 5700. 1-16. Available at www.crs.gov.
  62. Wirtz, J., Lewin, M.O. & Williams, J.D. (2007). Causes and Consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326-348.
  63. World Privacy Forum Report (2011), Many Failures: A Brief History of Privacy Self-Regulation. 14 Oct. Available at https://www.worldprivacyforum.org.
  64. Yadav, Y. (2015), Centre Giving Final Touches to Right to Privacy Bill, 17 March, Indian Express, New Delhi.

Cite this Article: